US8364942B2 - Electronic device having an alterable configuration and methods of manufacturing and configuring the same - Google Patents

Electronic device having an alterable configuration and methods of manufacturing and configuring the same Download PDF

Info

Publication number
US8364942B2
US8364942B2 US13/413,974 US201213413974A US8364942B2 US 8364942 B2 US8364942 B2 US 8364942B2 US 201213413974 A US201213413974 A US 201213413974A US 8364942 B2 US8364942 B2 US 8364942B2
Authority
US
United States
Prior art keywords
operating system
partition
volatile memory
boot
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US13/413,974
Other versions
US20120166787A1 (en
Inventor
Robert Henderson Wood
Bao Quoc Nguyen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion Ltd filed Critical Research in Motion Ltd
Priority to US13/413,974 priority Critical patent/US8364942B2/en
Assigned to RESEARCH IN MOTION LIMITED reassignment RESEARCH IN MOTION LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NGUYEN, BAO QUOC, WOOD, ROBERT HENDERSON
Publication of US20120166787A1 publication Critical patent/US20120166787A1/en
Priority to US13/719,725 priority patent/US8583907B2/en
Application granted granted Critical
Publication of US8364942B2 publication Critical patent/US8364942B2/en
Assigned to BLACKBERRY LIMITED reassignment BLACKBERRY LIMITED CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: RESEARCH IN MOTION LIMITED
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • G06F9/441Multiboot arrangements, i.e. selecting an operating system to be loaded

Definitions

  • the invention relates generally to electronic devices and, more specifically, to an electronic device having an alterable configuration and methods of manufacturing and configuring the same.
  • OS factory operating system
  • the special calibration firmware is replaced with shipping firmware that includes a shipping OS. It can be desirable to disable or remove the customized special calibration firmware as it can include security holes that are undesirable in the shipping electronic device.
  • the functionality of the shipping OS is generally free of such security holes and complies with standardized specifications that permit interoperability between different electronic devices.
  • the shipping OS is often customized for a particular network carrier. Such customizations can include, but are not limited to, graphical user interface images, the default settings for certain functionality (e.g. whether a Bluetooth radio is on or off), languages, fonts and the configuration of certain radio features.
  • a flash utility executing on an external computing device is typically employed to overwrite the contents of the flash memory chip via a universal serial bus (“USB”) cable.
  • USB universal serial bus
  • the shipping firmware generally must include calibration functionality in order to enable the calibration of the electronic device during manufacture. While the shipping firmware no longer needs to be placed into flash memory after assembly, the presence of such functionality in the shipping firmware can introduce security flaws in the electronic device. Further, the shipping firmware that includes the calibration functionality is less time-efficient than the special calibration firmware for calibration and customization of the electronic device.
  • an electronic device having an alterable configuration comprising:
  • flash memory storing a boot ROM and for storing a first operating system in a first operating system partition and a second operating system in a second operating system partition, said boot ROM being executed by said processor and operable to boot said first operating system if available in said flash memory and to boot said second operating system if said first operating system is at least one of absent in said flash memory and invalid when said electronic device is powered up.
  • an electronic device having an alterable configuration comprising:
  • boot ROM for controlling the booting of said electronic device, said boot ROM being operable, when executed by a processor of said electronic device, to boot a first operating system in a first operating system partition in flash memory if present and valid and to boot a second operating system in a second operating system partition in flash memory if said first operating system is not present in said flash memory and valid when said electronic device is powered up.
  • said flash memory storing a boot ROM, a first operating system in a first operating system partition and a second operating system in a second operating system partition, said boot ROM being operable to boot said first operating system if present in said flash memory and valid when said electronic device is powered up, said boot ROM being operable to boot said second operating system if said first operating system is not present in said flash memory and valid when said electronic device is powered up;
  • flash memory of said electronic device having a first operating system in a first operating system partition and a second operating system in a second operating system partition, said electronic device being operable to execute said second operating system if present in said flash memory and valid in lieu of said first operating system;
  • an electronic device having an alterable configuration comprising:
  • a non-volatile memory configurable to include at least a first partition and a second partition, the non-volatile memory storing a boot ROM that is operable when said boot ROM is executed by a processor of said electronic device to: in the event that a third partition is available, boot an operating system in the third partition, the operating system operable when booted to cause the third partition to be deleted and the second partition to be expanded to encompass memory freed by the deletion; and otherwise boot an operating system in the first partition.
  • assembling said electronic device using a non-volatile memory to include at least a first partition, a second partition, a third partition and a boot ROM;
  • boot ROM is operable to execute a second operating system stored in the second partition when the first operating system is no longer available in the non-volatile memory.
  • a method of configuring an electronic device having non-volatile memory with a first partition and a second partition comprising:
  • the electronic device causing the electronic device to execute a downloader application, wherein the downloader application is operable when executed by a processor on the electronic device to download an installer operating system and reduce the second partition to accommodate an installer operating system partition;
  • the installer operating system is operable when booted to overwrite an operating system in the first partition with a replacement operating system, delete the installer operating system partition, and expand the second partition to encompass non-volatile memory freed by the deletion;
  • assembling said electronic device using a non-volatile memory to include at least a first operating system in a first partition, a second operating system in a second partition, a file system in a third partition, and a boot ROM;
  • the boot ROM executing the boot ROM a first time, the boot ROM booting the first operating system into volatile memory, the first operating system deleting the first partition and expanding the third partition to encompass non-volatile memory freed by the deleting;
  • the boot ROM in response to determining that the first operating system is no longer available due to the deleting automatically booting the second operating system into volatile memory.
  • the invention allows for a second operating system to be loaded onto an electronic device and used until it is no longer required, after which it can be removed.
  • FIG. 1 shows an electronic device in accordance with an aspect of the invention
  • FIG. 2 is a schematic diagram of the electronic device of FIG. 1 ;
  • FIG. 3 is a schematic diagram of the contents of the non-volatile memory of the electronic device of FIG. 1 ;
  • FIG. 4 illustrates the method of selecting and booting an operating system on the electronic device of FIG. 1 ;
  • FIG. 5 illustrates the method of manufacturing the electronic device of FIG. 1 ;
  • FIG. 6 illustrates the method of making an operating system unavailable during the method of FIG. 5 ;
  • FIG. 7 is a schematic diagram of the contents of the non-volatile memory of the electronic device of FIG. 1 after performance of the method of FIG. 6 ;
  • FIG. 8 illustrates a method of upgrading the operating system on an electronic device, such as the device of FIG. 1 , in accordance with another embodiment of the invention.
  • the invention allows both an interim and a permanent operating system to be loaded onto an electronic device prior to assembly of the device.
  • the operating systems are loaded onto a flash chip prior to assembly of the electronic device by a specialized machine that processes multiple flash chips simultaneously. This process takes approximately thirty (30) seconds.
  • a communication interface of the assembled electronic device such as a universal serial bus (“USB”) port, can be avoided.
  • FIG. 1 An exemplary electronic device 20 is shown in FIG. 1 .
  • the electronic device 20 in this case is a cellular telephone capable of two-way voice and data communications.
  • the electronic device 20 is provided with a wired communication interface 28 for wired communication with other computing devices.
  • FIG. 2 is a schematic diagram showing the block elements of the electronic device 20 , including random access memory (“RAM”) 32 , an input interface 36 , an output interface 40 , a power supply 44 , a processor 48 , the wired communication interface 28 , a wireless communication interface 52 and non-volatile memory 56 , all in communication over a local bus 60 .
  • the RAM 32 is volatile memory that is used to store data temporarily during operation of the electronic device 20 .
  • the input interface 36 includes a set of keys and controls for composing email messages, adjusting the volume or powering up the electronic device 20 , and also includes a microphone for receiving audio commands and communication.
  • the output interface 40 provides, among other things, a visual indication of communications to and from the electronic device 20 .
  • the power supply 44 is a rechargeable battery.
  • the processor 48 executes an operating system and other software for operating the electronic device 20 .
  • the wired communication interface 28 is a universal serial bus (“USB”) port that permits communication with other computing devices via a USB cable and also receives power for charging the rechargeable battery.
  • the wireless communication interface 52 is a cellular communication radio for sending and receiving communications wirelessly.
  • the non-volatile memory 56 is a flash chip that is pre-loaded with a boot ROM, one or more operating systems and other programs to enable various functionality of the device.
  • FIG. 3 better illustrates the layout of the non-volatile memory 56 .
  • the non-volatile memory 56 includes a boot ROM 64 , a memory configuration table (“MCT”) 68 , a shipping OS partition 72 , a factory OS partition 76 and a file system partition 80 .
  • the boot ROM 64 selects an OS (partition) to be booted on powering up the electronic device 20 .
  • “powering up” also includes the restarting or resetting of the electronic device 20 .
  • the boot ROM 64 is always located at the start of the memory address space in the non-volatile memory 56 .
  • the MCT 68 is a register of the partitions in the non-volatile memory 56 .
  • the shipping OS partition 72 houses the shipping OS that controls the operation of the electronic device 20 in a commercial environment.
  • the factory OS partition 76 houses the factory OS that controls the operation of the electronic device 20 during calibration, etc.
  • the file system partition 76 can include customizations for resellers or end-users, such as languages, fonts, customized logos, ringtones, profiles, etc.
  • FIG. 4 illustrates the method of selecting and booting an operating system, performed by the electronic device 20 generally at 100 .
  • the electronic device 20 executes the boot ROM 64 (step 110 ).
  • the boot ROM 64 determines whether the factory OS partition 76 is present (step 120 ). If the factory OS partition 76 is present, the boot ROM 64 tries to validate the factory OS partition 76 (step 130 ). If the factory OS partition 76 is validated by the boot ROM 64 , the factory OS is booted (step 140 ). If, instead, the factory OS partition 76 is not validated, or if the factory OS partition 76 is not present, the boot ROM 64 determines whether the shipping OS partition 72 is present (step 150 ).
  • the boot ROM 64 tries to validate the shipping OS partition 72 (step 160 ). If the shipping OS partition 72 is authenticated by the boot ROM 64 , the shipping OS is booted (step 170 ). If, instead, the shipping OS partition 72 is not validated, or if the shipping OS partition 72 is not present, the boot ROM 64 displays an error code on the display of the electronic device 20 (step 180 ). Upon booting either of the factory OS or the shipping OS, or displaying the error code, the method 100 ends.
  • the boot ROM 64 examines the MCT 68 . When partition addition, deletion and modifications are made, the changes are written to the MCT 68 .
  • the boot ROM 64 attempts to locate and authenticate a digital signature in the OS partition.
  • the digital signature includes information pertaining to the contents of the partition that is encrypted using a secret key of a trusted source.
  • a public key corresponding to the secret key is used by the boot ROM 64 to decrypt the information, which is then used to verify that the contents have not been tampered with or otherwise damaged.
  • the authentication is performed in order to reduce the probability that potentially malicious or damaged code is run on the electronic device 20 . If the OS partition does not contain a digital signature, the validation fails. If a digital signature is present, the boot ROM 64 determines whether the digital signature corresponds to the public key.
  • the authentication and, thus, the validation fail. If the digital signature corresponds to the public key, its information is compared to the contents of the OS partition. If the contents of the OS partition do not match the digital signature, the validation fails, otherwise the OS partition is validated.
  • the boot ROM 64 refuses to load an OS and displays an error code at step 180 .
  • FIG. 5 shows the method 200 of manufacturing the electronic device 20 .
  • the non-volatile memory 56 is flashed with an image to provide it with the partitions shown in FIG. 3 (step 210 ).
  • the non-volatile memory 56 is then secured by soldering to a main board during assembly of the electronic device 20 (step 220 ).
  • the electronic device 20 is assembled, it is calibrated and customized (step 230 ).
  • the factory OS partition 76 is then deleted (step 240 ).
  • a master image of the contents of the non-volatile memory 56 shown in FIG. 3 is flashed to the non-volatile memory.
  • a specialized machine processes a number of non-volatile memory chips simultaneously. The specialized machine is able to load the operating systems into the non-volatile memory 56 more rapidly than otherwise possible after assembly. This is due to the relatively slow speed of the wired communication interface 28 (i.e., USB) and the non-volatile memory of the electronic device 20 .
  • the loading speed is generally only limited by the write speed of the non-volatile memory chip.
  • a voltage that is higher than otherwise possible can be used. The higher voltage enables programming of the non-volatile memory 56 at approximately twice the speed achieved when the electronic device 20 is assembled.
  • the factory OS includes a number of modifications that are made to reduce the time required to calibrate and customize the electronic device at step 230 .
  • the shipping OS operates the USB wired communication interface 28 at an initial power level of 100 milliamps for a period of time before ramping up to an ultimate power level of 500 milliamps. This is done for compatibility reasons as some computers are equipped to handle only one of the power levels.
  • the factory OS bypasses the initial power level and immediately employs the ultimate power level of 500 milliamps as the computers used during production use this power level for USB connections.
  • the radios of the wireless communication interface 52 are not operated in accordance with various communication specifications in order to reduce time latencies.
  • gain of the antennas of the wireless communication interface 52 is set, personal identification numbers are assigned, internal voltage references are programmed, audio volumes are calibrated, the display contrast is configured to a suitable default level, etc.
  • the factory OS if present and valid, will have priority over the shipping OS.
  • the factory OS makes itself unavailable by deleting itself.
  • the shipping OS will boot when the electronic device 20 is powered up.
  • FIG. 6 illustrates the method 300 of altering the configuration of the electronic device 20 .
  • the factory OS is booted and executed in RAM 32 (step 310 ).
  • An instruction to delete the factory OS partition 76 is received (step 320 ).
  • the factory OS partition 76 is deleted and the file system partition 80 is expanded to encompass the memory freed by the deletion of the factory OS partition 76 (step 330 ).
  • the electronic device 20 is then restarted to verify the correct booting of the shipping OS (step 340 ).
  • the factory OS After being loaded into RAM 32 at step 310 , the factory OS provides an interface for receiving an instruction to delete the factory OS partition 76 .
  • the instruction is received via the wired communication interface 28 .
  • the factory OS As the factory OS is executed in RAM 32 when booted, it does not rely on the factory OS partition 76 in non-volatile memory 56 for operation. As a result, the factory OS is able to entirely delete the factory OS partition 76 at step 330 upon receipt of an instruction to do so. In order to delete the factory OS partition 76 , the factory OS makes an API call to modify the MCT 68 to remove reference to the factory OS partition 76 and to expand the file system partition 80 to encompass the space previously occupied by the factory OS partition 76 .
  • the shipping OS is booted by the boot ROM as a result of method 100 .
  • the electronic device 20 operates thereafter as if the factory OS was never present.
  • the invention also provides advantages in performing OS upgrades, such as over-the air (“OTA”).
  • OS upgrades such as over-the air (“OTA”).
  • Some systems for updating the OS of an electronic device provide an installer application in the boot ROM that can install a new OS over the OS currently installed on the device.
  • the boot ROM is conditioned into an install mode where it downloads the new OS or retrieves the new OS from a saved location in the file system, and then replaces the current OS with the new OS.
  • the electronic device can thereafter use the new OS.
  • the space available for the boot ROM can be limited. Further, it can be desirable to upgrade the actual installer program itself.
  • space for display drivers is generally unavailable and, thus, information cannot be displayed to a user of the electronic device during the OS upgrade.
  • OS upgrades can be performed on the electronic device without placing the installer program in the boot ROM 64 .
  • the installer can be provisioned with a display driver to present information to the user of the electronic device during the OS upgrade.
  • the installer can be equipped to handle packages compressed using differing methods.
  • a method of upgrading the OS of an electronic device in accordance with another embodiment of the invention is generally shown at 400 in FIG. 8 .
  • the file system partition is resized by a downloader application to accommodate a new partition (step 410 ).
  • a package containing an installer OS is downloaded to the electronic device by the downloader application (step 420 ).
  • the downloader application validates the package (step 430 ). If the package is not valid, the method 400 ends. If the package is, instead, valid, the installer OS is then unpacked by the downloader application into the new partition (step 440 ).
  • the electronic device is then restarted (step 450 ). Upon restart, the boot ROM recognizes the presence of the second OS (i.e., the installer OS) and boots the installer OS.
  • An installer application in the installer OS unpacks a compressed version of the upgraded shipping OS contained in the installer OS partition and writes it over the current shipping OS (step 460 ).
  • the installer application which is executing in RAM, then deletes the installer OS partition (step 470 ). Once the installer partition has been deleted, the installer application executing in RAM resizes the file system (step 480 ).
  • the installer application then restarts the electronic device (step 490 ), after which the method 400 ends. Upon restart, the boot ROM does not find the second OS partition and loads the upgraded shipping OS.
  • a backup copy of the MCT is created to aid in failure recovery.
  • the location of the backup of the MCT is fixed so that the boot ROM is later able to locate it. If the MCT is not modified successfully, the backup copy of the MCT is retrieved by the MCT during failure recovery.
  • the MCT is modified before the partition resizing/deleting operations are performed to reduce the probability of failure.
  • the installer OS is downloaded over-the-air.
  • the method 400 can also provide advantages over the method of overwriting the factory OS with the shipping OS via a USB cable. In some cases, it can be faster to download a compressed package containing the shipping OS and have an installer OS decompress and write it over the factory OS than to simply overwrite the factory OS with the shipping OS via the USB cable.
  • an operating system can be upgraded using the invention.
  • the invention enables a partial or complete upgrade of an operating system of an electronic device. As the operating system being modified or replaced is not executing or otherwise being used, the installer can make differing levels of modifications to it.

Abstract

An electronic device having an alterable configuration includes a non-volatile memory configurable to include at least a first partition and a second partition, the non-volatile memory storing a boot ROM. The boot ROM is operable when executed by a processor of said electronic device to, in the event that a third partition is available, boot an operating system in the third partition, the operating system operable when booted to cause the third partition to be deleted and the second partition to be expanded to encompass memory freed by the deletion; and otherwise boot an operating system in the first partition.

Description

REFERENCE TO RELATED APPLICATION
This application is a continuation application of U.S. patent application Ser. No. 12/392,348, filed Feb. 25, 2009, which is a continuation application of U.S. patent application Ser. No. 11/082,706 filed on Mar. 18, 2005, and now granted as U.S. Pat. No. 7,516,315, all of which are hereby incorporated by reference in their entirety.
FIELD OF THE INVENTION
The invention relates generally to electronic devices and, more specifically, to an electronic device having an alterable configuration and methods of manufacturing and configuring the same.
BACKGROUND OF THE INVENTION
The use of operating systems customized for the purpose of electronic device calibration is known. During manufacture, special calibration firmware including a factory operating system (“OS”) is programmed or loaded onto a flash memory chip, which is then soldered onto a main circuit board incorporated into an electronic device. The factory OS is customized to facilitate calibration and customization of the device.
Once the calibration and customization of the electronic device is completed, the special calibration firmware is replaced with shipping firmware that includes a shipping OS. It can be desirable to disable or remove the customized special calibration firmware as it can include security holes that are undesirable in the shipping electronic device. The functionality of the shipping OS is generally free of such security holes and complies with standardized specifications that permit interoperability between different electronic devices. For electronic devices having cellular communication functionality, such as mobile phones and two-way wireless email devices, the shipping OS is often customized for a particular network carrier. Such customizations can include, but are not limited to, graphical user interface images, the default settings for certain functionality (e.g. whether a Bluetooth radio is on or off), languages, fonts and the configuration of certain radio features.
A flash utility executing on an external computing device is typically employed to overwrite the contents of the flash memory chip via a universal serial bus (“USB”) cable. This process of loading the shipping firmware onto the assembled electronic device is time-consuming, taking two to three minutes. As a result, this stage of production is costly, requiring many computers and operators to be dedicated to this task.
If the final version of the shipping firmware is completed before manufacturing begins, it can be advantageous to load the shipping firmware onto the flash memory chip in place of the factory OS prior to soldering onto the main circuit board. In this case, the shipping firmware generally must include calibration functionality in order to enable the calibration of the electronic device during manufacture. While the shipping firmware no longer needs to be placed into flash memory after assembly, the presence of such functionality in the shipping firmware can introduce security flaws in the electronic device. Further, the shipping firmware that includes the calibration functionality is less time-efficient than the special calibration firmware for calibration and customization of the electronic device.
SUMMARY OF THE INVENTION
In one aspect of the invention, there is provided an electronic device having an alterable configuration, comprising:
a processor; and
flash memory storing a boot ROM and for storing a first operating system in a first operating system partition and a second operating system in a second operating system partition, said boot ROM being executed by said processor and operable to boot said first operating system if available in said flash memory and to boot said second operating system if said first operating system is at least one of absent in said flash memory and invalid when said electronic device is powered up.
In another aspect of the invention, there is provided an electronic device having an alterable configuration, comprising:
a boot ROM for controlling the booting of said electronic device, said boot ROM being operable, when executed by a processor of said electronic device, to boot a first operating system in a first operating system partition in flash memory if present and valid and to boot a second operating system in a second operating system partition in flash memory if said first operating system is not present in said flash memory and valid when said electronic device is powered up.
In a further aspect of the invention, there is provided a method of manufacturing an electronic device, comprising:
assembling said electronic device using a flash memory, said flash memory storing a boot ROM, a first operating system in a first operating system partition and a second operating system in a second operating system partition, said boot ROM being operable to boot said first operating system if present in said flash memory and valid when said electronic device is powered up, said boot ROM being operable to boot said second operating system if said first operating system is not present in said flash memory and valid when said electronic device is powered up; and
deleting said first operating system partition in said flash memory.
In a still further aspect of the invention, there is provided a method of configuring an electronic device, comprising:
provisioning flash memory of said electronic device having a first operating system in a first operating system partition and a second operating system in a second operating system partition, said electronic device being operable to execute said second operating system if present in said flash memory and valid in lieu of said first operating system;
executing said second operating on said electronic device; and
deleting said second operating system partition in said flash memory.
In another aspect of the invention, there is provided an electronic device having an alterable configuration, comprising:
a non-volatile memory configurable to include at least a first partition and a second partition, the non-volatile memory storing a boot ROM that is operable when said boot ROM is executed by a processor of said electronic device to: in the event that a third partition is available, boot an operating system in the third partition, the operating system operable when booted to cause the third partition to be deleted and the second partition to be expanded to encompass memory freed by the deletion; and otherwise
boot an operating system in the first partition.
In yet another aspect of the invention there is provided a method of manufacturing an electronic device, comprising:
assembling said electronic device using a non-volatile memory to include at least a first partition, a second partition, a third partition and a boot ROM;
causing the boot ROM to execute a first operating system stored in the first partition, in volatile memory;
deleting the first partition; and
expanding the third partition to encompass non-volatile memory freed by the deleting,
wherein said boot ROM is operable to execute a second operating system stored in the second partition when the first operating system is no longer available in the non-volatile memory.
According to another aspect of the invention there is provided a method of configuring an electronic device having non-volatile memory with a first partition and a second partition, comprising:
causing the electronic device to execute a downloader application, wherein the downloader application is operable when executed by a processor on the electronic device to download an installer operating system and reduce the second partition to accommodate an installer operating system partition;
storing the installer operating system in the installer operating system partition;
causing the electronic device to boot the installer operating system,
wherein the installer operating system is operable when booted to overwrite an operating system in the first partition with a replacement operating system, delete the installer operating system partition, and expand the second partition to encompass non-volatile memory freed by the deletion; and
causing the electronic device to boot the replacement operating system.
According to another aspect of the invention there is provided a method of configuring an electronic device, comprising:
assembling said electronic device using a non-volatile memory to include at least a first operating system in a first partition, a second operating system in a second partition, a file system in a third partition, and a boot ROM;
executing the boot ROM a first time, the boot ROM booting the first operating system into volatile memory, the first operating system deleting the first partition and expanding the third partition to encompass non-volatile memory freed by the deleting;
executing the boot ROM a second time, the boot ROM in response to determining that the first operating system is no longer available due to the deleting automatically booting the second operating system into volatile memory.
The invention allows for a second operating system to be loaded onto an electronic device and used until it is no longer required, after which it can be removed.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments will now be described, by way of example only, with reference to the attached Figures, wherein:
FIG. 1 shows an electronic device in accordance with an aspect of the invention;
FIG. 2 is a schematic diagram of the electronic device of FIG. 1;
FIG. 3 is a schematic diagram of the contents of the non-volatile memory of the electronic device of FIG. 1;
FIG. 4 illustrates the method of selecting and booting an operating system on the electronic device of FIG. 1;
FIG. 5 illustrates the method of manufacturing the electronic device of FIG. 1;
FIG. 6 illustrates the method of making an operating system unavailable during the method of FIG. 5;
FIG. 7 is a schematic diagram of the contents of the non-volatile memory of the electronic device of FIG. 1 after performance of the method of FIG. 6; and
FIG. 8 illustrates a method of upgrading the operating system on an electronic device, such as the device of FIG. 1, in accordance with another embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTION
The invention allows both an interim and a permanent operating system to be loaded onto an electronic device prior to assembly of the device. The operating systems are loaded onto a flash chip prior to assembly of the electronic device by a specialized machine that processes multiple flash chips simultaneously. This process takes approximately thirty (30) seconds. Using this approach, the slower method of loading the shipping OS onto the electronic device using a communication interface of the assembled electronic device, such as a universal serial bus (“USB”) port, can be avoided.
An exemplary electronic device 20 is shown in FIG. 1. The electronic device 20 in this case is a cellular telephone capable of two-way voice and data communications. The electronic device 20 is provided with a wired communication interface 28 for wired communication with other computing devices.
FIG. 2 is a schematic diagram showing the block elements of the electronic device 20, including random access memory (“RAM”) 32, an input interface 36, an output interface 40, a power supply 44, a processor 48, the wired communication interface 28, a wireless communication interface 52 and non-volatile memory 56, all in communication over a local bus 60. The RAM 32 is volatile memory that is used to store data temporarily during operation of the electronic device 20. The input interface 36 includes a set of keys and controls for composing email messages, adjusting the volume or powering up the electronic device 20, and also includes a microphone for receiving audio commands and communication. The output interface 40 provides, among other things, a visual indication of communications to and from the electronic device 20. The power supply 44 is a rechargeable battery. The processor 48 executes an operating system and other software for operating the electronic device 20. The wired communication interface 28 is a universal serial bus (“USB”) port that permits communication with other computing devices via a USB cable and also receives power for charging the rechargeable battery. The wireless communication interface 52 is a cellular communication radio for sending and receiving communications wirelessly.
The non-volatile memory 56 is a flash chip that is pre-loaded with a boot ROM, one or more operating systems and other programs to enable various functionality of the device.
FIG. 3 better illustrates the layout of the non-volatile memory 56. The non-volatile memory 56 includes a boot ROM 64, a memory configuration table (“MCT”) 68, a shipping OS partition 72, a factory OS partition 76 and a file system partition 80. The boot ROM 64 selects an OS (partition) to be booted on powering up the electronic device 20. For purposes of this discussion, “powering up” also includes the restarting or resetting of the electronic device 20. The boot ROM 64 is always located at the start of the memory address space in the non-volatile memory 56. The MCT 68 is a register of the partitions in the non-volatile memory 56. The shipping OS partition 72 houses the shipping OS that controls the operation of the electronic device 20 in a commercial environment. The factory OS partition 76 houses the factory OS that controls the operation of the electronic device 20 during calibration, etc. The file system partition 76 can include customizations for resellers or end-users, such as languages, fonts, customized logos, ringtones, profiles, etc.
FIG. 4 illustrates the method of selecting and booting an operating system, performed by the electronic device 20 generally at 100. Upon powering up, the electronic device 20 executes the boot ROM 64 (step 110). The boot ROM 64 then determines whether the factory OS partition 76 is present (step 120). If the factory OS partition 76 is present, the boot ROM 64 tries to validate the factory OS partition 76 (step 130). If the factory OS partition 76 is validated by the boot ROM 64, the factory OS is booted (step 140). If, instead, the factory OS partition 76 is not validated, or if the factory OS partition 76 is not present, the boot ROM 64 determines whether the shipping OS partition 72 is present (step 150). If the shipping OS partition 72 is present, the boot ROM 64 tries to validate the shipping OS partition 72 (step 160). If the shipping OS partition 72 is authenticated by the boot ROM 64, the shipping OS is booted (step 170). If, instead, the shipping OS partition 72 is not validated, or if the shipping OS partition 72 is not present, the boot ROM 64 displays an error code on the display of the electronic device 20 (step 180). Upon booting either of the factory OS or the shipping OS, or displaying the error code, the method 100 ends.
In order to determine whether the factory OS partition 76 and the shipping OS partition 72 are present at steps 120 and 150 respectively, the boot ROM 64 examines the MCT 68. When partition addition, deletion and modifications are made, the changes are written to the MCT 68.
During the validation of either of the factory OS partition 76 at step 130 and the shipping OS partition 72 at step 160, the boot ROM 64 attempts to locate and authenticate a digital signature in the OS partition. The digital signature includes information pertaining to the contents of the partition that is encrypted using a secret key of a trusted source. A public key corresponding to the secret key is used by the boot ROM 64 to decrypt the information, which is then used to verify that the contents have not been tampered with or otherwise damaged. The authentication is performed in order to reduce the probability that potentially malicious or damaged code is run on the electronic device 20. If the OS partition does not contain a digital signature, the validation fails. If a digital signature is present, the boot ROM 64 determines whether the digital signature corresponds to the public key. If the digital signature does not correspond to the public key, the authentication and, thus, the validation fail. If the digital signature corresponds to the public key, its information is compared to the contents of the OS partition. If the contents of the OS partition do not match the digital signature, the validation fails, otherwise the OS partition is validated.
If neither of the OS partitions are present and validated, the boot ROM 64 refuses to load an OS and displays an error code at step 180.
FIG. 5 shows the method 200 of manufacturing the electronic device 20. The non-volatile memory 56 is flashed with an image to provide it with the partitions shown in FIG. 3 (step 210). The non-volatile memory 56 is then secured by soldering to a main board during assembly of the electronic device 20 (step 220). Once the electronic device 20 is assembled, it is calibrated and customized (step 230). The factory OS partition 76 is then deleted (step 240).
During the flashing or loading of the non-volatile memory 56, a master image of the contents of the non-volatile memory 56 shown in FIG. 3 is flashed to the non-volatile memory. A specialized machine processes a number of non-volatile memory chips simultaneously. The specialized machine is able to load the operating systems into the non-volatile memory 56 more rapidly than otherwise possible after assembly. This is due to the relatively slow speed of the wired communication interface 28 (i.e., USB) and the non-volatile memory of the electronic device 20. By directly loading the operating systems onto the non-volatile memory 56, the loading speed is generally only limited by the write speed of the non-volatile memory chip. When the non-volatile memory 56 is programmed directly, a voltage that is higher than otherwise possible can be used. The higher voltage enables programming of the non-volatile memory 56 at approximately twice the speed achieved when the electronic device 20 is assembled.
The factory OS includes a number of modifications that are made to reduce the time required to calibrate and customize the electronic device at step 230. For example, the shipping OS operates the USB wired communication interface 28 at an initial power level of 100 milliamps for a period of time before ramping up to an ultimate power level of 500 milliamps. This is done for compatibility reasons as some computers are equipped to handle only one of the power levels. The factory OS bypasses the initial power level and immediately employs the ultimate power level of 500 milliamps as the computers used during production use this power level for USB connections. In addition, the radios of the wireless communication interface 52 are not operated in accordance with various communication specifications in order to reduce time latencies.
During calibration, gain of the antennas of the wireless communication interface 52 is set, personal identification numbers are assigned, internal voltage references are programmed, audio volumes are calibrated, the display contrast is configured to a suitable default level, etc.
Using the method 100, the factory OS, if present and valid, will have priority over the shipping OS. In order to configure the electronic device 20 to use the shipping OS, the factory OS makes itself unavailable by deleting itself. After the deletion of the factory OS partition 76, the shipping OS will boot when the electronic device 20 is powered up.
FIG. 6 illustrates the method 300 of altering the configuration of the electronic device 20. The factory OS is booted and executed in RAM 32 (step 310). An instruction to delete the factory OS partition 76 is received (step 320). The factory OS partition 76 is deleted and the file system partition 80 is expanded to encompass the memory freed by the deletion of the factory OS partition 76 (step 330). The electronic device 20 is then restarted to verify the correct booting of the shipping OS (step 340).
After being loaded into RAM 32 at step 310, the factory OS provides an interface for receiving an instruction to delete the factory OS partition 76. The instruction is received via the wired communication interface 28.
As the factory OS is executed in RAM 32 when booted, it does not rely on the factory OS partition 76 in non-volatile memory 56 for operation. As a result, the factory OS is able to entirely delete the factory OS partition 76 at step 330 upon receipt of an instruction to do so. In order to delete the factory OS partition 76, the factory OS makes an API call to modify the MCT 68 to remove reference to the factory OS partition 76 and to expand the file system partition 80 to encompass the space previously occupied by the factory OS partition 76.
Upon restarting of the electronic device 20 at step 340, the shipping OS is booted by the boot ROM as a result of method 100. The electronic device 20 operates thereafter as if the factory OS was never present.
ALTERNATIVE EMBODIMENT
The invention also provides advantages in performing OS upgrades, such as over-the air (“OTA”). Some systems for updating the OS of an electronic device provide an installer application in the boot ROM that can install a new OS over the OS currently installed on the device. The boot ROM is conditioned into an install mode where it downloads the new OS or retrieves the new OS from a saved location in the file system, and then replaces the current OS with the new OS. The electronic device can thereafter use the new OS. The space available for the boot ROM, however, can be limited. Further, it can be desirable to upgrade the actual installer program itself. In addition, by placing the installer in the boot ROM, space for display drivers is generally unavailable and, thus, information cannot be displayed to a user of the electronic device during the OS upgrade. Using the invention, such OS upgrades can be performed on the electronic device without placing the installer program in the boot ROM 64. Further, the installer can be provisioned with a display driver to present information to the user of the electronic device during the OS upgrade. In addition, the installer can be equipped to handle packages compressed using differing methods.
A method of upgrading the OS of an electronic device in accordance with another embodiment of the invention is generally shown at 400 in FIG. 8. The file system partition is resized by a downloader application to accommodate a new partition (step 410). A package containing an installer OS is downloaded to the electronic device by the downloader application (step 420). The downloader application validates the package (step 430). If the package is not valid, the method 400 ends. If the package is, instead, valid, the installer OS is then unpacked by the downloader application into the new partition (step 440). The electronic device is then restarted (step 450). Upon restart, the boot ROM recognizes the presence of the second OS (i.e., the installer OS) and boots the installer OS. An installer application in the installer OS unpacks a compressed version of the upgraded shipping OS contained in the installer OS partition and writes it over the current shipping OS (step 460). The installer application, which is executing in RAM, then deletes the installer OS partition (step 470). Once the installer partition has been deleted, the installer application executing in RAM resizes the file system (step 480). The installer application then restarts the electronic device (step 490), after which the method 400 ends. Upon restart, the boot ROM does not find the second OS partition and loads the upgraded shipping OS.
During the resizing of the file system to create a new partition at step 410, a backup copy of the MCT is created to aid in failure recovery. The location of the backup of the MCT is fixed so that the boot ROM is later able to locate it. If the MCT is not modified successfully, the backup copy of the MCT is retrieved by the MCT during failure recovery. During the deletion of the installer OS partition and subsequent resizing of the file system partition, the MCT is modified before the partition resizing/deleting operations are performed to reduce the probability of failure.
In a particular embodiment, the installer OS is downloaded over-the-air.
The method 400 can also provide advantages over the method of overwriting the factory OS with the shipping OS via a USB cable. In some cases, it can be faster to download a compressed package containing the shipping OS and have an installer OS decompress and write it over the factory OS than to simply overwrite the factory OS with the shipping OS via the USB cable.
While the making of an operating system unavailable has been described as being performed by deletion, other methods will occur to those skilled in the art. For example, where an OS partition is digitally signed, one or more bits of data can be altered in the OS partition to cause it to become invalidatable.
While the invention has been described with specificity to factory and shipping OSes, other types of OSes will occur to those skilled in the art.
Some or all of an operating system can be upgraded using the invention. The invention enables a partial or complete upgrade of an operating system of an electronic device. As the operating system being modified or replaced is not executing or otherwise being used, the installer can make differing levels of modifications to it.
The above-described embodiments of the invention are intended to be examples of the invention and alterations and modifications may be effected thereto, by those of skill in the art, without departing from the scope of the invention which is defined solely by the claims appended hereto.

Claims (20)

1. A mobile communications device, comprising:
non-volatile memory including a first operating system in a first partition, a second operating system in a second partition, and a third partition, the non-volatile memory storing a boot ROM that is operable when the boot ROM is executed by a processor of the mobile communications device to:
boot the first operating system, the first operating system operable when booted to calibrate the mobile communications device, the first operating system further operable when booted to delete the first operating system and expand the third partition to encompass memory freed by the deletion; and
boot the second operating system when the first operating system is no longer available in the non-volatile memory.
2. The mobile communications device of claim 1, wherein the boot ROM is executed by a processor of the mobile communications device when the mobile communications device is powered up.
3. The mobile communications device of claim 1, wherein the boot ROM is operable to boot the first operating system if the first operating system is digitally signed, and to boot the second operating system if the second operating system is digitally signed.
4. The mobile communications device of claim 1, wherein the first operating system is a factory operating system and the second operating system is a shipping operating system.
5. The mobile communications device of claim 1, wherein the boot ROM is operable to boot the first operating system only if a digital signature associated with the first partition is authenticated, and wherein the boot ROM is operable to boot the second operating system only if another digital signature associated with the second partition is authenticated.
6. The mobile communications device of claim 1, wherein the non-volatile memory further includes a memory configuration table comprising a register of partitions that is updated when partition addition, deletion, and modifications are made.
7. The mobile communications device of claim 1, wherein the non-volatile memory is a flash chip.
8. A method of manufacturing a mobile communications device comprising non-volatile memory including at least a first partition, a second partition, a third partition and a boot ROM, the method comprising:
executing a first operating system stored in the first partition,
deleting the first partition; and
expanding the third partition to encompass non-volatile memory freed by the deleting,
the boot ROM operable to execute a second operating system stored in the second partition when the first operating system is no longer available in the non-volatile memory.
9. The method of claim 8, wherein the boot ROM is operable to boot the first operating system if present in the non-volatile memory and digitally signed.
10. The method of claim 8, further comprising: booting the first operating system with the boot ROM when the electronic device is powered up.
11. The method of claim 8, further comprising: loading the boot ROM, the first operating system and the second operating system into the non-volatile memory prior to assembling the mobile communications device.
12. The method of claim 8, wherein the step of deleting is performed by the first operating system.
13. The method of claim 8, wherein the first operating system is a factory operating system and the second operating system is a shipping operating system.
14. The method of claim 8, wherein the first operating system is an installer operating system.
15. The method of claim 8, wherein the boot ROM is operable to boot the first operating system if present in the non-volatile memory and if a digital signature associated with the first partition is authenticated.
16. A method of configuring a mobile communications device comprising non-volatile memory including a first partition and a second partition, the method comprising:
downloading an installer operating system and reducing the second partition to accommodate an installer operating system partition;
storing the installer operating system in the installer operating system partition;
booting the installer operating system,
the installer operating system being operable when booted to overwrite an operating system in the first partition with a replacement operating system, delete the installer operating system partition, and expand the second partition to encompass non-volatile memory freed by the deletion; and
booting the replacement operating system.
17. The method of claim 16, further comprising:
before reducing the second partition, modifying a memory configuration table to reflect the second partition reduction; and
before expanding the second partition, modifying the memory configuration table to reflect the second partition expansion.
18. The method of claim 17, further comprising creating a backup copy of the memory configuration table in non-volatile memory.
19. The method of claim 16, wherein the installer operating system is downloaded over-the-air.
20. The method of claim 16, wherein the operating system in the first partition is a shipping operating system.
US13/413,974 2005-03-18 2012-03-07 Electronic device having an alterable configuration and methods of manufacturing and configuring the same Expired - Fee Related US8364942B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/413,974 US8364942B2 (en) 2005-03-18 2012-03-07 Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US13/719,725 US8583907B2 (en) 2005-03-18 2012-12-19 Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/082,706 US7516315B2 (en) 2005-03-18 2005-03-18 Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US12/392,348 US8156316B2 (en) 2005-03-18 2009-02-25 Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US13/413,974 US8364942B2 (en) 2005-03-18 2012-03-07 Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/392,348 Continuation US8156316B2 (en) 2005-03-18 2009-02-25 Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/719,725 Continuation US8583907B2 (en) 2005-03-18 2012-12-19 Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Publications (2)

Publication Number Publication Date
US20120166787A1 US20120166787A1 (en) 2012-06-28
US8364942B2 true US8364942B2 (en) 2013-01-29

Family

ID=37011730

Family Applications (4)

Application Number Title Priority Date Filing Date
US11/082,706 Expired - Fee Related US7516315B2 (en) 2005-03-18 2005-03-18 Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US12/392,348 Expired - Fee Related US8156316B2 (en) 2005-03-18 2009-02-25 Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US13/413,974 Expired - Fee Related US8364942B2 (en) 2005-03-18 2012-03-07 Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US13/719,725 Expired - Fee Related US8583907B2 (en) 2005-03-18 2012-12-19 Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/082,706 Expired - Fee Related US7516315B2 (en) 2005-03-18 2005-03-18 Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US12/392,348 Expired - Fee Related US8156316B2 (en) 2005-03-18 2009-02-25 Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/719,725 Expired - Fee Related US8583907B2 (en) 2005-03-18 2012-12-19 Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Country Status (1)

Country Link
US (4) US7516315B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120096450A1 (en) * 2009-05-04 2012-04-19 Nokia Siemens Networks Oy Mechanism for updating software
US8583907B2 (en) 2005-03-18 2013-11-12 Blackberry Limited Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US10437503B2 (en) 2017-08-02 2019-10-08 Mastercard International Incorporated Systems and methods for redundant array data alignment

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI114416B (en) * 2001-06-15 2004-10-15 Nokia Corp Method for securing the electronic device, the backup system and the electronic device
US9240888B2 (en) * 2003-03-05 2016-01-19 Bally Gaming, Inc. Authentication system for gaming machines
US20070282710A1 (en) * 2006-05-25 2007-12-06 Motorola, Inc. Method for demonstrating the features of an application program
US7650437B2 (en) * 2006-08-01 2010-01-19 Research In Motion Limited System and method for managing hardware configuration parameters
US7865712B2 (en) * 2007-12-26 2011-01-04 Intel Corporation Method and apparatus for booting a processing system
US8789036B2 (en) * 2008-01-17 2014-07-22 Qualcomm Incorporated Device software customization
US20090216864A1 (en) * 2008-02-27 2009-08-27 Nokia Corporation Methods, apparatuses, and computer program products, for automatically finding configuration settings for services
US8341384B2 (en) 2008-06-06 2012-12-25 Apple Inc. Installation of software onto a computer
US8250350B2 (en) * 2008-08-26 2012-08-21 Texas Digital And Multimedia Systems Computer system with non-volatile write-protected memory based operating system and secure system architecture
EP2180403A1 (en) * 2008-10-21 2010-04-28 Moxa Inc. Backup system that stores boot data file of embedded system in different storage sections and method thereof
US8510543B1 (en) * 2009-05-28 2013-08-13 American Megatrends, Inc. Firmware supporting multiple boot paths
JP5460167B2 (en) * 2009-07-31 2014-04-02 キヤノン株式会社 Information processing apparatus, control method for information processing apparatus, and control program
CN102033761A (en) * 2009-09-30 2011-04-27 鸿富锦精密工业(深圳)有限公司 Electronic device and multi-boot method thereof
US8112505B1 (en) * 2009-10-20 2012-02-07 Wanova Technologies, Ltd. On-demand block-level file system streaming to remote desktops
US8983870B2 (en) * 2010-08-18 2015-03-17 Snap-On Incorporated Apparatus and method for managing software applications using partitioned data storage devices
US9111305B2 (en) * 2010-12-17 2015-08-18 Amazon Technologies, Inc. Personal remote storage for purchased electronic content items
US8486717B2 (en) 2011-01-18 2013-07-16 Symbolics, Llc Lateral flow assays using two dimensional features
US8966236B2 (en) * 2011-05-05 2015-02-24 Microsoft Technology Licensing, Llc Dynamically redirecting boot to another operating system
US9069579B2 (en) 2011-12-29 2015-06-30 Vmware, Inc. N-way synchronization of desktop images
US9009456B2 (en) * 2012-04-19 2015-04-14 International Business Machines Corporation Automatic update of persistent boot parameter storage
CN103559054B (en) * 2013-10-30 2017-10-10 华为终端有限公司 Realization, delet method and the device of intelligent terminal multi-operation system
TW201537458A (en) * 2014-03-31 2015-10-01 Quanta Comp Inc Method of operating multiple operating systems and the electronic device thereof
CN104503786B (en) 2014-12-15 2020-10-16 小米科技有限责任公司 Firmware refreshing method and device
US10360051B2 (en) * 2014-12-22 2019-07-23 International Business Machines Corporation Emulated device firmware testable by native operating system tools
CN104408209A (en) * 2014-12-25 2015-03-11 中科创达软件股份有限公司 File processing method, file processing device and electronic equipment in start-up process of mobile operating system
US11349701B2 (en) 2015-03-09 2022-05-31 Vapor IO Inc. Data center management with rack-controllers
CN107535070B (en) * 2015-03-09 2019-11-29 纬波里奥股份有限责任公司 For calculating the rack of equipment
US10257268B2 (en) 2015-03-09 2019-04-09 Vapor IO Inc. Distributed peer-to-peer data center management
US10120696B2 (en) * 2015-03-19 2018-11-06 Sony Corporation Method and device for controlling usability of a communication device
US10545567B2 (en) 2017-01-06 2020-01-28 International Business Machines Corporation Method and apparatus for power savings in communications equipment
CN109587524B (en) * 2018-10-31 2021-08-03 视联动力信息技术股份有限公司 Method and device for synchronizing video networking resources to Internet terminal

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5381549A (en) 1989-11-29 1995-01-10 Canon Kabushiki Kaisha Information processing apparatus
US5729683A (en) 1995-05-18 1998-03-17 Compaq Computer Corporation Programming memory devices through the parallel port of a computer system
US5859911A (en) 1997-04-16 1999-01-12 Compaq Computer Corp. Method for the secure remote flashing of the BIOS of a computer
US5987605A (en) 1998-02-28 1999-11-16 Hewlett-Packard Co. Methods and apparatus for dual-boot memory selection, update, and recovery in a programmable device
US6175917B1 (en) 1998-04-23 2001-01-16 Vpnet Technologies, Inc. Method and apparatus for swapping a computer operating system
US6205513B1 (en) 1996-08-22 2001-03-20 Schneider Automation System and process for load an operating system of an information processing device
EP1100014A2 (en) 1999-11-12 2001-05-16 Xerox Corporation Method for initiating program control
US6393585B1 (en) 1998-12-23 2002-05-21 Scientific-Atlanta, Inc. Method and apparatus for restoring operating systems in a set-top box environment
US6418541B1 (en) 1996-08-23 2002-07-09 Samsung Electronics Co., Ltd. Method of testing computer system with hard disk
US20020103996A1 (en) 2001-01-31 2002-08-01 Levasseur Joshua T. Method and system for installing an operating system
US6442067B1 (en) 2000-05-23 2002-08-27 Compaq Information Technologies Group, L.P. Recovery ROM for array controllers
US20020143844A1 (en) 2001-03-29 2002-10-03 Wen-Sung Tsai Computer system with two operating systems
US20020157001A1 (en) 2001-04-19 2002-10-24 Alec Huang Computer system capable of switching operating system
US6557169B1 (en) 1998-10-11 2003-04-29 International Business Machines Corporation Method and system for changing the operating system of a workstation connected to a data transmission network
US6594723B1 (en) 1999-09-07 2003-07-15 Microsoft Corporation Method and apparatus for updating data in nonvolatile memory
US20040054883A1 (en) 2002-09-13 2004-03-18 International Business Machines Corporation Firmware updating
US20040117414A1 (en) 2002-12-17 2004-06-17 Capital One Financial Corporation Method and system for automatically updating operating systems
US20040192373A1 (en) 2002-12-05 2004-09-30 Galetti Ralph R. Method and circuit for initializing non-volatile memory
US20050055595A1 (en) 2001-09-17 2005-03-10 Mark Frazer Software update method, apparatus and system
US6934881B2 (en) 2000-10-06 2005-08-23 Hewlett-Packard Development Company, L.P. Memory including portion storing a copy of primary operating system and method of operating computer including the memory
US6948099B1 (en) 1999-07-30 2005-09-20 Intel Corporation Re-loading operating systems
US7263589B2 (en) 2003-08-08 2007-08-28 Lg Electronics Inc. Apparatus and method for controlling booting operation of computer system
US7516315B2 (en) * 2005-03-18 2009-04-07 Research In Motion Ltd. Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6173417B1 (en) * 1998-04-30 2001-01-09 Intel Corporation Initializing and restarting operating systems
US6178503B1 (en) * 1998-09-11 2001-01-23 Powerquest Corporation Managing multiple operating systems on a single computer
US6763458B1 (en) * 1999-09-27 2004-07-13 Captaris, Inc. System and method for installing and servicing an operating system in a computer or information appliance
US6532538B1 (en) * 2000-02-17 2003-03-11 International Business Machines Corporation Method and system for supporting multiple operating systems on the same disk running on different computers at the same time
US7000231B1 (en) * 2000-09-22 2006-02-14 Hewlett-Packard Development Company, L.P. Method of manufacturing operating system master template, method of manufacturing a computer entity and product resulting therefrom, and method of producing a production version of an operating system
US20040059905A1 (en) * 2002-09-19 2004-03-25 Soulier George R. Method and apparatus for short-power cycle detection
WO2005071552A1 (en) * 2004-01-21 2005-08-04 Orient Instrument Computer Co., Ltd. Data cleaning program
US7502928B2 (en) * 2004-11-12 2009-03-10 Sony Computer Entertainment Inc. Methods and apparatus for secure data processing and transmission
US20090138865A1 (en) * 2004-12-10 2009-05-28 Furbee Richard L Performing an operating system upgrade without multiple system interruptions
US7509530B2 (en) * 2005-01-19 2009-03-24 Sonic Solutions Method and system for use in restoring an active partition

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5381549A (en) 1989-11-29 1995-01-10 Canon Kabushiki Kaisha Information processing apparatus
US5729683A (en) 1995-05-18 1998-03-17 Compaq Computer Corporation Programming memory devices through the parallel port of a computer system
US6205513B1 (en) 1996-08-22 2001-03-20 Schneider Automation System and process for load an operating system of an information processing device
US6418541B1 (en) 1996-08-23 2002-07-09 Samsung Electronics Co., Ltd. Method of testing computer system with hard disk
US5859911A (en) 1997-04-16 1999-01-12 Compaq Computer Corp. Method for the secure remote flashing of the BIOS of a computer
US5987605A (en) 1998-02-28 1999-11-16 Hewlett-Packard Co. Methods and apparatus for dual-boot memory selection, update, and recovery in a programmable device
US6175917B1 (en) 1998-04-23 2001-01-16 Vpnet Technologies, Inc. Method and apparatus for swapping a computer operating system
US6557169B1 (en) 1998-10-11 2003-04-29 International Business Machines Corporation Method and system for changing the operating system of a workstation connected to a data transmission network
US6393585B1 (en) 1998-12-23 2002-05-21 Scientific-Atlanta, Inc. Method and apparatus for restoring operating systems in a set-top box environment
US6948099B1 (en) 1999-07-30 2005-09-20 Intel Corporation Re-loading operating systems
US6594723B1 (en) 1999-09-07 2003-07-15 Microsoft Corporation Method and apparatus for updating data in nonvolatile memory
EP1100014A2 (en) 1999-11-12 2001-05-16 Xerox Corporation Method for initiating program control
US6442067B1 (en) 2000-05-23 2002-08-27 Compaq Information Technologies Group, L.P. Recovery ROM for array controllers
US6934881B2 (en) 2000-10-06 2005-08-23 Hewlett-Packard Development Company, L.P. Memory including portion storing a copy of primary operating system and method of operating computer including the memory
US20020103996A1 (en) 2001-01-31 2002-08-01 Levasseur Joshua T. Method and system for installing an operating system
US20020143844A1 (en) 2001-03-29 2002-10-03 Wen-Sung Tsai Computer system with two operating systems
US20020157001A1 (en) 2001-04-19 2002-10-24 Alec Huang Computer system capable of switching operating system
US20050055595A1 (en) 2001-09-17 2005-03-10 Mark Frazer Software update method, apparatus and system
US20040054883A1 (en) 2002-09-13 2004-03-18 International Business Machines Corporation Firmware updating
US20040192373A1 (en) 2002-12-05 2004-09-30 Galetti Ralph R. Method and circuit for initializing non-volatile memory
US20040117414A1 (en) 2002-12-17 2004-06-17 Capital One Financial Corporation Method and system for automatically updating operating systems
US7263589B2 (en) 2003-08-08 2007-08-28 Lg Electronics Inc. Apparatus and method for controlling booting operation of computer system
US7516315B2 (en) * 2005-03-18 2009-04-07 Research In Motion Ltd. Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US8156316B2 (en) * 2005-03-18 2012-04-10 Research In Motion Limited Electronic device having an alterable configuration and methods of manufacturing and configuring the same

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8583907B2 (en) 2005-03-18 2013-11-12 Blackberry Limited Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US20120096450A1 (en) * 2009-05-04 2012-04-19 Nokia Siemens Networks Oy Mechanism for updating software
US8566815B2 (en) * 2009-05-04 2013-10-22 Nokia Siemens Networks Oy Mechanism for updating software
US10437503B2 (en) 2017-08-02 2019-10-08 Mastercard International Incorporated Systems and methods for redundant array data alignment
US10877681B2 (en) 2017-08-02 2020-12-29 Mastercard International Incorporated Systems and methods for redundant array data alignment

Also Published As

Publication number Publication date
US20060212691A1 (en) 2006-09-21
US20130111201A1 (en) 2013-05-02
US7516315B2 (en) 2009-04-07
US8583907B2 (en) 2013-11-12
US8156316B2 (en) 2012-04-10
US20120166787A1 (en) 2012-06-28
US20090158027A1 (en) 2009-06-18

Similar Documents

Publication Publication Date Title
US8364942B2 (en) Electronic device having an alterable configuration and methods of manufacturing and configuring the same
US7275153B2 (en) Booting and boot code update system using boot strapper code to select between a loader and a duplicate backup loader
US7584379B2 (en) Mobile terminal and software update method
US8719810B2 (en) Program upgrade system and method for over the air-capable mobile terminal
US8726259B2 (en) System and method for preserving device parameters during a FOTA upgrade
US20100325622A1 (en) Updating Firmware of an Electronic Device
WO2022007656A1 (en) Bootloader software updating method and apparatus, embedded controller, and storage medium
US11222118B2 (en) Method for updating selinux security policy and terminal
US8136108B2 (en) Updating firmware with multiple processors
CN110597542B (en) Software automatic OTA (over the air) upgrading method and device and electronic equipment
WO2009125396A2 (en) Updating firmware on mobile electronic devices
CN107643898A (en) Terminal staging method and device
JP2010044574A (en) Portable terminal, portable terminal control method and portable terminal control program
CA2539897C (en) An electronic device having an alterable configuration and methods of manufacturing and configuring the same
KR100729525B1 (en) Method and system for updating firmware
CN108121560A (en) Difference bag upgrade method, device, terminal and computer readable storage medium
KR100876748B1 (en) Method for updating boot code
KR100538627B1 (en) Method for partupgrading sofrware of wireless terminal
KR100617796B1 (en) Mobile terminal equipment capable of upgrading a wireless firmware and method thereof
CN117667168A (en) Basic input/output system updating method
TWI575459B (en) Terminal device and system upgrading method thereof
KR20060013820A (en) Method for upgrading a program of portable device
CN115756561A (en) Software upgrading method and device, computer equipment and storage medium
CN115756540A (en) Firmware upgrading method, electronic equipment and storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: RESEARCH IN MOTION LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WOOD, ROBERT HENDERSON;NGUYEN, BAO QUOC;SIGNING DATES FROM 20050309 TO 20050311;REEL/FRAME:027820/0524

AS Assignment

Owner name: BLACKBERRY LIMITED, ONTARIO

Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:034179/0923

Effective date: 20130709

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20170129